IT Management  >   Systems Operations  >   Security  >  

Managing Security

RSS Feed   
Managing Security Reports
Email Fraud Defense (EFD)
sponsored by Proofpoint, Inc.
VIDEO: Learn how to block fraudulent emails before they reach your employees, customers, and partners with Proofpoint Email Fraud Defense (EFD).
Posted: 01 Nov 2018 | Premiered: 29 Oct 2018

Proofpoint, Inc.

To SIEM or Not to SIEM, Find Out Your Options
sponsored by Arctic Wolf
VIDEO: With the growing complexity of SIEM solutions increasing and a shortage of people with cybersecurity skills, many organizations are looking for alternatives to SIEM. This webcast compares SIEM to security operations centers (SOCs).
Posted: 06 Dec 2018 | Premieres: 31 Dec 2018

Arctic Wolf

Employing Machine Learning in Security and UEBA: A Data-Science Driven Approach
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to learn how machine learning can enable your team and technology to be better, smarter, and faster by having advanced analytics at its fingertips to solve real problems – like detecting User and Entity Behavior Analytics threats – quickly.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

LogRhythm, Inc.

The Elevation of Security
sponsored by HP
EBOOK: We live in the era of digital disruption, when always-on connectivity, a mobile workforce and globalization leave us more vulnerable than ever to cybersecurity assaults. Access this 28-page e-book to grasp a better understanding of how to detect and prevent security attacks in this changing world.
Posted: 15 Nov 2018 | Published: 15 Nov 2018


Asia-Pacific 2018 Cybersecurity: Perceptions & Practices
sponsored by LogRhythm, Inc.
RESEARCH CONTENT: Download the Asia-Pacific 2018 Cybersecurity: Perceptions & Practices survey to learn about the state of security infrastructure for organizations across the globe
Posted: 12 Nov 2018 | Published: 12 Nov 2018

LogRhythm, Inc.

Cloud Security: Are You Ready?
sponsored by Symantec
RESOURCE: Download this white paper for a look at some of the key elements and best practices for midsize enterprises looking to ensure security in their cloud implementations.
Posted: 15 Nov 2018 | Published: 15 Nov 2018


10 Must Ask Questions When Choosing a SOAR Solution
sponsored by Siemplify
RESOURCE: Now that there are many security orchestration, automation, and response (SOAR) platforms in the market, how do you chose the right one? Download this resource for 10 important questions to ask before choosing a SOAR platform, today.
Posted: 26 Nov 2018 | Published: 26 Nov 2018


Automating Detection and Response: A SANS Review of Swimlane
sponsored by Swimlane
ANALYST REPORT: In this product brief, learn about SOAR (Security Orchestration, Automation and Response) technology that offers integration and interoperability across security teams' tools that provides a centralized user interface for security analysts to alert on and triage tracking and case management.
Posted: 12 Dec 2018 | Published: 12 Dec 2018


Identity Architect Ground Rules: Ten IAM Design Principles
sponsored by WSO2, Inc.
WHITE PAPER: Download this white paper for 10 design principles an IAM architect should consider when building an IAM infrastructure from the ground-up.
Posted: 08 Nov 2018 | Published: 31 Dec 2017

WSO2, Inc.

Protect your Data in the Cloud
sponsored by Dell EMC and Intel®
VIDEO: Learn about Dell EMC's Integrated Data Protection Appliance, a cloud enabled protection storage product that protects physical and virtual workloads.
Posted: 02 Nov 2018 | Premiered: 02 Nov 2018

Dell EMC and Intel®

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement